Top Menu

TOra is an open source database administration and sql tool for Oracle. With TOra you can perform virtually any administrative task on your Oracle database servers - anything from user and security management to server tuning.

It's schema browser together with the sql editor is an ideal tool for both developers and database administrators.

TOra handles multiple connections and it's advanced sql editor includes code completion and syntax highlighting - and for performance it displays your execution plan. A project that is a worthy competitor to the commercial products.

OpenLaszlo is an open source development platform for web applications. It's main target today is generating macromedia flash files (swf)and AJAX/DHTML for use on web pages and sites.

OpenLaszlo is script based with it's own LZX programming language - and eventhough it does not provide a wysiwyg user interface it a still simple to use and applications are easy to build.

For building rich internet applicationsOpenLaszlo is a great tool. And recently OpenLaszlo and SUN made a joint announcement to make OpenLaszlo available on Java micro edition (J2ME), which includes mobilephones and set-top boxes.

OpenLaszlo is the only rich internet platform that lets you write once and compile to both flash and DHTML. It's easy to get started with OpenLaszlo.

"Wifi" means "wireless fidelity". The term "wifi" refers to certain kinds of wireless local area networks, or WLAN (as opposed to LAN, or computers that are networked together with wires).

Travelers with PDA's (like Blackberries) and other handheld devices or laptops with wireless cards can connect to the internet via wifi. A wireless card is like a modem without a phone line (like an airport card in a Mac).

Wi-Fi is short for wireless fidelity. It refers to a local area network which uses high frequency radio signals to send and receive data over short distances (approx. 200 feet).

Wi-fi is also written as wifi, WiFI or even WIFI.

Wi-Fi is also the trademark of the Wi-Fi Alliance, the trade organization that defines the Wi-Fi standards.

Wi-Fi or wireless is used to refer to communicating without cords or cables. It mainly refers to using radio frequencies and/or infrared waves.

XML Copy Editor is a versatile XML editor primarily focused on text editing with XML files. However, XML Copy Editor provides many other features including validation of DTD and XML schemas - as well as XSLT and XPath.

The tag-free editing allows simple editing of XML files without having to worry about or look at all of the XML tags. And like other development editors XML Copy Editor supports folding so that less important parts of the XML file can be minimized during editing.

Additionally XML Copy Editor include spell checking and import and export of Microsoft Word documents, however, only on the Microsoft Windows platform.

Here is the solution for your kids. You can download and install the KIDO'Z Browser in your Computer.

Features of KIDO'Z Browser : Safe & free internet browsing for kids. Easy to use. Kids don't need to know how to read or write. Direct access to the best sites, videos and games for kids on the net.

When you first download and install the browser. And run it, A little window should pop up asking your your child's name, and the parent's name and email. just fill in those detail's and your ready to go.

By installing the Compatibility Pack in addition to Microsoft Office 2000, Office XP, or Office 2003, you will be able to open, edit, and save files using the file formats new to Word, Excel, and PowerPoint 2007.

You can apply these to Family too and vary them. I hope they help you find atrue friend, raise a family, or that good marriage the rest of your life. Itdid for me 27 years and still working at it.

1. You are best "Friends":You tell each other your problems and you both "Listen" until finished. Thenif asked your opinion, you give it, or you may ask; "If you would like tohear my opinion? " Respect" the answer whether wrong or right.

2. Be a good "Listener":We all need some one to talk to and what better a person than a "Friend",Listen to each other.

If you are good in lateral thinking, then you can be a good strategicthinker or... be a part of Think Tank. Here is an interesting quiz totest your Lateral Thinking abilities --- Think!

1. There is a man who lives on the top floor of a very tall building.Everyday he gets the elevator down to the ground floor to leave thebuilding to go to work.Upon returning from work though, he can onlytravel half way up in the lift and has to walk the rest of the wayunless it's raining! Why?

(This is probably the best known and most celebrated of all lateralthinking puzzles. It is a true classic. Although there are manypossible solutions which fit the initial conditions, only thecanonical answer is truly satisfying. )

2. A man and his son are in a car accident. The father dies on thescene, but the child is rushed to the hospital. When he arrives thesurgeon says,

"I can't operate on this boy, he is my son! "How can this be?

3. A man is wearing black. Black shoes, socks, trousers, lumper,gloves and balaclava. He is walking down a black street with all thestreet lamps off.

A black car is coming towards him with its light off but somehowmanages to stop in time. How did the driver see the man?

4. Why is it better to have round manhole covers than square ones?This is logical rather than lateral, but it is a good puzzle that canbe solved by lateral thinking techniques. It is supposedly used by avery well-known software company as an interview question forprospective employees.

5. A man went to a party and drank some of the punch. He then leftearly. Everyone else at the party who drank the punch subsequentlydied of poisoning. Why did the man not die?

6. A man walks into a bar and asks the barman for a glass of water.The barman pulls out a gun and points it at the man. The man says'Thank you' and walks out.

(This puzzle claims to be the best of the genre. It is simple in itsstatement, absolutely baffling and yet with a completely satisfyingsolution. Most people struggle very hard to solve this one yet theylike the answer when they hear it or have the satisfaction of figuringit out. )

SOLUTIONS1. The man is very, very short and can only reach halfway up theelevator buttons. However,if it is raining then he will have hisumbrella with him and can press the higher buttons with it.

2. The surgeon was his mother.

3. It was day time.

4. A square manhole cover can be turned and dropped down the diagonalof the manhole. A round manhole cannot be dropped down the manhole. Sofor safety and practicality, all manhole covers should be round.

5. The poison in the punch came from the ice cubes. When the man Drankthe punch, the ice was fully frozen. Gradually it melted, poisoningthe punch.

6.. The man had hiccups. The barman recognized this from his speechand drew the gun in order to give him a shock. It worked and cured thehiccups-so the man no longer needed the water.

Some PDF documents prevent the user from copying and pasting or printing it's contents. This sometimes presents a problem since the author of the PDF might have used a font that is not available in the sytem trying to read it. This page contains a free online utility that allows you to upload a PDF, once uploaded, a version of the PDF without printing or copying/pasting restrictions is displayed in a new browser window.

Microsoft Excel allows a user to protect one or more sheets in a spreadsheet. Protected sheets cannot be modified without entering a password (chosen by the person that protected the spreadsheet). Sometimes these passwords are lost, therefore protected spreadsheets are permanently locked.

2.How can you compare a part of the name rather than the entire name ?

SELECT * FROM people WHERE empname LIKE ‘%ab%’Would return a recordset with records consisting empname the sequence ‘ab‘ in empname .

3.How could I get distinct entries from a table ?

The SELECT statement in conjunction with DISTINCT lets you select a set of distinct values from a table in a database. The values selected from the database table would of course depend on the various conditions that are specified in the SQL query.

SELECT DISTINCT empname FROM emptable

4.How to get the results of a Query sorted in any order ?

You can sort the results and return the sorted results to your program by using ORDER BY keyword thus saving you the pain of carrying out the sorting yourself. The ORDER BY keyword is used for sorting.

SELECT empname, age, city FROM emptable ORDER BY empname

5.How can I find the total number of records in a table ?

You could use the COUNT keyword , exampleSELECT COUNT(*) FROM emp WHERE age>40

6.What is GROUP BY ?

The GROUP BY keywords have been added to SQL because aggregate functions (like SUM) return the aggregate of all column values every time they are called. Without the GROUP BY functionality, finding the sum for each individual group of column values was not possible

7.What is the difference among “dropping a table”, “truncating a table” and “deleting all records” from a table ?

Having clause is used only with group functions whereas Where is not used with.

10.What’s the difference between a primary key and a unique key ?

Both primary key and unique enforce uniqueness of the column on which they are defined. But by default primary key creates a clustered index on the column, where are unique creates a nonclustered index by default. Another major difference is that, primary key doesn’t allow NULLs, but unique key allows one NULL only.

11.What are triggers? How to invoke a trigger on demand ?

Triggers are special kind of stored procedures that get executed automatically when an INSERT, UPDATE or DELETE operation takes place on a table.

Triggers can’t be invoked on demand. They get triggered only when an associated action (INSERT, UPDATE, DELETE) happens on the table on which they are defined.

Triggers are generally used to implement business rules, auditing. Triggers can also be used to extend the referential integrity checks, but wherever possible, use constraints for this purpose, instead of triggers, as constraints are much faster.

12. What is a join and explain different types of joins ?

Joins are used in queries to explain how different tables are related. Joins also let you select data from a table depending upon data from another table.

Types of Joins

INNER JOINS: It will pull all the rows from both tables where there is a match.

It is private SQL area to execute the sql quries and store the information. There are two types of cursors implicit cursors and explicit cursors.

Implicit cursors are system defined and returns one row. Explicit cursors are user defined and returns multiple rows

15.How do you get Column names only for a table (SQL Server) ?

select name from syscolumnswhere id=(select id from sysobjects where name=’user_hdr’)order by colid –user_hdr is the table name

16.How to find stored procedures ?

select procedure_name from all_procedures

17.What are Extended stored procedures ?

Extended stored procedures let you create your own external routines in a programming language such as C. Extended stored procedures are DLLs that an instance of Microsoft SQL Server can dynamically load and run. Extended stored procedures run directly in the address space of an instance of SQL Server and are programmed by using the SQL Server Extended Stored Procedure API.

18. Explain about Cursors ?

Cursors are database objects used to traverse the results of an SQL query. They point to a certain location within a recordset and allow the operator to move forward (and sometimes backward, depending upon the cursor type) through the results one record at a time. There are different types of cursors: Static, Dynamic, Forward-only, Keyset-driven.

Cursors extend result processing by:

* Allowing positioning at specific rows of the result set. * Retrieving one row or block of rows from the current position in the result set. * Supporting data modifications to the rows at the current position in the result set. * Supporting different levels of visibility to changes made by other users to the database data that is presented in the result set. * Providing Transact-SQL statements in scripts, stored procedures, and triggers access to the data in a result set.

Disadvantages of cursors:

Each time you fetch a row from the cursor, it results in a network roundtrip, where as a normal SELECT query makes only one rowundtrip, however large the resultset is. Cursors are also costly because they require more resources and temporary storage (results in more IO operations). Furthere, there are restrictions on the SELECT statements that can be used with some types of cursors.

A stored procedure is a group of SQL statements that form a logical unit and perform a particular task. Stored procedures are used to encapsulate a set of operations or queries to execute on a database server.For example, operations on an employee database (hire, fire, promote, lookup) could be coded as stored procedures executed by application code. Stored procedures can be compiled and executed with different parameters and results, and they may have any combination of input, output, and input/output parameters.

View is a virtual or logical table composed of the result set of a query. Unlike orginary tables in a relational database, a view is not part of the physical schema. It is a dynamic virtual table computed or collated from data in the database. Chainging the data in a table alters the data shown in the view.

Views can provide advantages over tables

* They can subset the data contained in a table * They can join and simplify multiple tables into a single virtual table * Views can act as aggregated tables, where aggregated data (sum,average etc.) are calculated and presented as part of the data * Views can hide the complexity of data, * Views do not incur any extra storage overhead * Depending on the SQL engine used, views can provide extra security. * Limit the exposure to which a table or tables are exposed to outer world * Rows in a view are not sorted. So we cannot use ORDER BY clause in the view definition.

CREATE VIEW V_Customer AS SELECT First_Name, Last_Name, Country FROM Customer

21.Stored Function Vs Stored Procedure

Function :

1. Should return atleast one output parameter.Can return more than one parameter using OUT argument.

Have you ever wanted to convert files without the need to download software?

Zamzar allows you to transform your songs, videos, images and documents into a variety of different formats. Using Zamzar you can:

Make your PDF documents editable by converting them to MS Word Convert your ITunes (aac) files to mp3 Upload up to 5 files at a time to convert simultaneously Take advantage of over 150 different conversion types !

http://www.zamzar.com is offering free service for converting .DOC into .PDF.You need to signin in this site. You can upload your files for conversion.After converting your documents in expected format (i.e., PDF) it will be mailed to your mail address.

Zamzar supports conversion between a wide variety of different file formats.For knowing more informations about File formats supported by Zamzar please click the following link.

Using http://www.sheetconvert.com, We can convert our 2007 based .xlsx files into 2003 based .xls.

I've been using Sheetconvert, a great new service that allows you to convert your spreadsheet files online for free. I thought you might be interested in trying it out - It allows you to convert .xlsx files to .xls files and share them with friends.

We can use Microsoft Outlook to get e-mail from Gmail. We need to configure some settings in Gmail and Outlook. Please follow the below links for detailed configuration for connecting Outlook with Gmail.

He is a gynaecologist in Pune and a very gifted writer....enjoy thisextremely funny story.

My wife is an ENT Surgeon while I am a Gynaecologist. This can lead to somecomplications, as I recently learned to my anguish.

A General Practitioner called me up and told me that she is sending apatient of hers for an abortion. Unknown to me, she had also referred a female with earwax forremoval of the wax to my wife.

I duly informed the receptionist to send the patient right in as she wasexpected (and expecting!) As Murphy lays down the laws of our hospital, itwas but natural that the patient who wanted the wax removed from her ear,landed up with me.

This is the conversation that I had with the patient.

"Please come in. Be seated..." I said with a big smile. I always have abig smile, when I am going to earn some money. The patient gave a feeble smileand sat hesitantly on the edge of the chair. "Relax."

"Doctor, will this hurt a lot?"

"Not at all."

The patient relaxed visibly. "You know something, Doctor, we triedremoving it at home, but failed.."

I was shocked. "Thank God. Trying this at home can cause seriouscomplications. "

"I first tried to remove it by jumping up and down, but it just wouldn'tbudge."

I smiled and said, "If it were that easy, who would need doctors?" She gave a cute smile and said, "Yeah! My neighbour tried to remove itwith his finger, but the hole is so small that he used a hair pin." "Oh my God!"

"Yes! My mother even tried a matchstick."

My blood pressure was shooting skywards. I just sputtered without utteringa word.

"Tell me, doctor, how do I avoid getting this dirt inside me?"

I knew that it was an unwanted pregnancy, but calling it dirt was toomuch.

I replied a bit angrily, "There are tablets which can prevent thishappening. Or you could use protection at night."

Now it was the patient's turn to be confused, "You mean to say that ithappens only at night?"

I saw her point. "No! No! I meant anytime of the day, whenever you are inthe mood, you should use protection."

She was even more confused, "It depends on my moods?"

Again I saw her point. "My mistake. You need not be in any sort of mood.It just happens."

"My neighbour advised me to go to one of those chaps who sit by theroadside."

"You mean that pin man?"

"Yeah!"

This neighbour of hers seemed to be a very dangerous man. Besides usingpins, he was sending her to such quacks. The only safety he knew was amongthe pins. "You were wise not to heed his advice."

"But I tried his other advice. He told me to put warm oil inside and wait.However, that also did not work."

This was getting more and more bizarre. Her neighbour deserved to belocked up either in a padded cell or a barred one.

"But have you taken your husband's permission?"

Now the patient looked confused. "Do I have to take my husband'spermission?

Because if you need his sign, he is working in Dubai . We were not able tomeet for the last one year."

It was my turn to be shocked. I gave a sly smirk. It was one of 'those'cases. The pin-wielding neighbour seemed to me the usual suspect. Ireassured her. "No! No! The husband's sign is not at all needed." "However, I did inform him on phone."

Her husband seemed to me a very broad-minded fellow. I didn't know whetherto congratulate her or to commiserate with her. So I hastily turned toother aspects. "Its good that you came a bit early."

"Actually I wanted to come early in the morning, but I had some otherwork."

"Oh! I did not mean early today. I meant that if you had delayed thisremoval, it would have started moving. Then it would have developed aheartbeat."

The patient was staring at me wide eyed as if watching a horror movie.Looking at her face, I decided that she was not fit to listen to thegrotesque details. I decided to relieve her a bit. I said, "You will bleeda bit, but only for a few days."

By now, the poor patient was trembling, "how-H-How much bleeding?"

"Oh, only slightly more than your menstrual period, and it will continueonly for a week or so."

By now the patient was clutching her hair in her fingers and staring at mewide-eyed. I asked her soothingly, "Why don't you lie down on theexamination table? Remove your clothes and relax."

Mix all above and boil in light flame approximately half hour, when itbecomes 3 cups, take it out and keep it for cooling. After cooling, mix 3cups of natural honey and keep it in bottle.

Every morning before breakfast, use one Tablespoon regularly. Your blockageof Vein's will open (No need any Angiography or by pass) Nature's wonderdrug is a cheap way to beat obesity, cancer, asthma and more.

Top doctors have revealed that the combination of garlic, vinegar, and honeyis a wonder drug that can cure every thing from cancer to arthritis. Amazingstudies from respected universities around the world prove the miracle homeremedy that costs just pennies a day to make is a super way to fight justabout any affliction. Experts have verified that this health-restoring trioof garlic, vinegar, and honey can wipe out both common and uncommonailments. Successes include ache, Alzheimer's disease, arthritis, high bloodpressure, some forms of cancer, excessive cholesterol level, colds, flu,gas, and indigestion, headaches, heart and circulatory problems,hemorrhoids, infertility and impotence, toothaches, obesity, ulcers and manyother diseases and conditions. In a study of arthritis victims Dr. AngusPeters of the University of Edinburgh's Arthritis Research Institute found adaily dose of vinegar and honey reduced pains by 90%.

A daily dose of garlic and vinegar has proved to be a powerful fat destroyerand weight reducer, according to Dr Raymond Fish of London's famous ObesityResearch Center.

The prestigious British medical journal Lancet reported that cholesterollevels plunged on average from231.4 to 224.4 after volunteers consumed 50grams of garlic and four ounces of butter. The study proved the dangersassociated with high fat foods can be neutralized by adding garlic to yourdiet. A study of 261 adult patients by the German Association of generalPractitioners indicated that serum cholesterol and triglyceride levelfactors associated with the risk of heart disease are significantly reducedby regular use of garlic in the diet. Studies at Housing's MD AndersonCancer Institute in Houston, the Pennsylvania State University, and GCLAsupport earlier evidence that certain ingredients in garlic block agents thecancer of the breast, colon, esophagus, and skin. The National CancerInstitute found in a study of 1,000 people that eating a lot of garlic islinked to a reduced risk of stomach cancer. Dr.Etik Block of the Stateuniversity of New York at Albany has discovered garlic unleashes at least100 sulfur-producing components, all of which are powerful medicines.

There appears to be little doubt that this astounding remedy of garlicvinegar and honey can extend life by protecting the user of many provenkillers.

'Patients given this miracle drink before breakfast showed a remarkablereduction in high blood pressure and cholesterol in less than a week'Italian nutritionist Emilio Steffani adds, 'Years of scientificinvestigation by experts around the world have proven beyond a doubt thatgarlic, vinegar, and honey are nature's magic potion.

'The three powerful ingredients are available everywhere and they cost onlypennies a day. Considering all that these natural substances can do forhuman health, it is amazing they are not more widely used' Dr. JackSoltanoff a nutritional expert from New York, praises the benefits of theapple cider vinegar. He has recorded remarkable success stories involvingarthritis sufferers,' I have seen many arthritis patients start to loosen upat once 'says Dr.Soltanoff. Some even call it (apple cider vinegar) anatural arthritis tonic that frees them from stiffness pain and throbbingaches.

Within just few weeks most pain wrecked arthritis patients can performnormal activities because of this simple tonic 'boxing legend Mohammad Alireportedly take a daily dose of garlic. Vinegar and honey to fight thesymptoms of Parkinson's disease and many other athletes use it to gaincompetitive edge.

Dr. Tsao is sweet on the power of honey. 'Honey has been described as theperfect food 'notes the respected researcher. It contains at least31nutrients, 13 minerals, the component parts of nine vitamins six acids andfour key enzymes. Patients, who took the traditional vinegar and honey drinkdaily, were more vigorous, had never cold or infectious diseases, and ingeneral were healthier than those who did not.

There is no question that this astounding drink elixir can extend life byprotecting you from many proved killers.

Honey not only makes your daily dose taste better. The sweet stuff also aidsin your body's ability to absorb the medical properties of the powerfulingredients. Garlic provides in storehouse of vitamins and minerals, butwhat excites researchers most is growing evidence that allicin, an enzyme(amino acid) present in large amounts in garlic stimulates the immunesystem.

BASIC ELIXIR RECIPE

Here is how to make your own miracle medicine:

In a bowl, mix together one cup of cider vinegar-use only cider vinegar, onecup of honey and eight cloves of chopped garlic. Place the combination in ablender and mix on high speed for 60 seconds, pour the mixture in to jar orother glass container, seal and have in the refrigerator for minimum of fivedays. Normal dosage is two teaspoon in a glass of water or fruit juice,grape or orange juice is best, before breakfast. A second dose, ifdesiredcan be taken in the evening.

RSS is a technology that is being used by millions of web users around the world to keep track of their favorite websites.

RSS (Rich Site Summary) is a format for delivering regularly changing web content. Many news-related sites, weblogs and other online publishers syndicate their content as an RSS Feed to whoever wants it.

Here's the difference between new and the old way. This is you and here are your favourite websites. You log onto your computer, and you're looking for something new, so you go out to your favourite blogs. Is there anything new there? Nope. You go out to your favourite news sites; is there anything new? Nope. Everytime you look for something new and it's not there, you've wasted valuable time. This is the old way.

Use ripe papaya pulp as it is or mix with oatmeal, honey or curd andapply on your face for 10 minutes. Rinse off with cold water when dry.Put a mix of papaya and cucumber pulp under the eyes to minimise darkcircles.

2. Apples

"Apart from vitamins and minerals, apples also contain pectin and tanninthat help tone and tighten the skin and improve blood circulation. Applesare specially effective for those with sensitive and fair skin," saysnatural beauty expert Suparna Trikha

To take care of sunburnt skin, add a teaspoon of glycerine to apple pulp(grate the apple or put in mixie) and apply on your face for fifteenminutes. Wash off with cold water.

For tired and undernourished skin, mix two teaspoons of grated apple, twopieces of mashed papaya, one teaspoon of fresh cream and a teaspoon of Chinaclay. Apply the mixture to a clean face and leave for 15 minutes. Wash offwith cold water for healthy-looking skin.

Mash two ripe bananas with a tablespoon of honey. Smooth over the faceand leave for 10-15 minutes. Rinse with cold water to reveal soft, suppleand hydrated skin.

4. Oranges

"The citrus family is best known for its astringent and toning properties.Rub fresh orange peel on your skin to tighten it and lighten the colour,"says beauty expert Shahnaz Husain.

Take the juice of two oranges and freeze it in an ice tray. Rub your facewith the frozen orange juice cubes whenever you need to look good after atiring day. The orange juice will give your tired, dull and oily face aninstant pick-me-up sheen.

5. Pomegranates

"Pomegranates are excellent for oily and combination skin. Rich in AHA,pomegranate juice acts as an astringent and is a natural toner too," saysSuparna Trikha.

Pound pomegranate seeds and use as a face scrub. This will remove excessoil and make your skin look fresh.

Using cotton wool, massage around 50 ml pomegranate juice on your facefor 10 minutes. Wash off for an instant glow.

Miranda IM is the smaller, faster, easier instant messenger with support for multiple protocols. Designed from the ground-up to be resource efficient while still providing a rich feature set, Miranda includes support for AIM, Jabber, ICQ, IRC, MSN, Yahoo, Gadu-Gadu and more.

Additionally, with the choice of hundreds of plugins, icons, sounds and other content, Miranda IM gives you the ability to modify, customise and extend functionality to make it your own.

EXE Password Protector is a security software for Windows OS that helps you password protect any .EXE file from unauthorized access. Thus, to launch an application that was protected by this utility, user must enter the valid password to be able to run a protected program.

Unlike other similar software, EXE Password Protector doesn't request any special protection programs to be running in background to carry out functionality. So an executable file protected by this utility is secured from unauthorized access even when it has been copied and launched from other computer. Such behavior is achieved by adding a supplementary code to the executable file.

The Gmail Notifier is an application that alerts you when you have new Gmail messages. It displays an icon in your system tray to let you know if you have unread Gmail messages, and shows you their subjects, senders and snippets, all without your having to open a web browser.

The Notifier is in beta. Before you download it, we encourage you to review the system requirements and privacy information.

If you have the Google Talk client installed, you will automatically receive new mail notifications from Google Talk and you do not need to install the Notifier.

= Equal<> or != Not equal> Greater than< Less than>= Greater than or equal<= Less than or equalBETWEEN Between an inclusive rangeLIKE Search for a pattern

3. SELECT statements:

SELECT column_name(s) FROM table_nameSELECT DISTINCT column_name(s) FROM table_nameSELECT column FROM table WHERE column operator valueSELECT column FROM table WHERE column LIKE patternSELECT column,SUM(column) FROM table GROUP BY columnSELECT column,SUM(column) FROM table GROUP BY column HAVING SUM(column) condition valueNote that single quotes around text values and numeric values should not be enclosed in quotes. Double quotes may be acceptable in some databases.

4. The SELECT INTO Statement is most often used to create backup copies of tables or for archiving records.

31. Which function is used to find the largest integer less than or equal to a specific value?

FLOOR.

32. Which is the subset of SQL commands used to manipulate Oracle Database structures, including tables?

Data Definition Language (DDL).

33. What is the use of DESC in SQL?

DESC has two purposes. It is used to describe a schema as well as to retrieve rows from table in descending order.Explanation :The query SELECT * FROM EMP ORDER BY ENAME DESC will display the output sorted on ENAME in descending order.

34. What command is used to create a table by copying the structure of another table?

CREATE TABLE .. AS SELECT commandExplanation:To copy only the structure, the WHERE clause of the SELECT command should contain a FALSE statement as in the following.CREATE TABLE NEWTABLE AS SELECT * FROM EXISTINGTABLE WHERE 1=2;If the WHERE condition is true, then all the rows or rows satisfying the condition will be copied to the new table.

35. TRUNCATE TABLE EMP;DELETE FROM EMP;Will the outputs of the above two commands differ?

Both will result in deleting all the rows in the table EMP..

36. What is the output of the following query SELECT TRUNC(1234.5678,-2) FROM DUAL;?

1200.

37. What are the wildcards used for pattern matching.?

_ for single character substitution and % for multi-character substitution.

38. What is the parameter substitution symbol used with INSERT INTO command?

UCASE() - Converts a field to upper caseLCASE() - Converts a field to lower caseMID() - Extract characters from a text fieldLEN() - Returns the length of a text fieldROUND() - Rounds a numeric field to the number of decimals specifiedNOW() - Returns the current system date and timeFORMAT() - Formats how a field is to be displayed

SQLite is the most widely deployed SQL database engine in the world. The source code for SQLite is in the public domain.

Suggested Uses For SQLite:

Application File Format : Rather than using fopen() to write XML or some proprietary format into disk files used by your application, use an SQLite database instead. You'll avoid having to write and troubleshoot a parser, your data will be more easily accessible and cross-platform, your updates will be transactional.

Database For Gadgets : SQLite is popular choice for the database engine in cellphones, PDAs, MP3 players, set-top boxes, and other electronic gadgets. SQLite has a small code footprint, makes efficient use of memory, disk space, and disk bandwidth, is highly reliable, and requires no maintenance from a Database Adminstrator.

Website Database : Because it requires no configuration and stores information in ordinary disk files, SQLite is a popular choice as the database to back small to medium-sized websites.

Stand-in For An Enterprise RDBMS : SQLite is often used as a surrogate for an enterprise RDBMS for demonstration purposes or for testing. SQLite is fast and requires no setup, which takes a lot of the hassle out of testing and which makes demos perky and easy to launch.

CamStudio is able to record all screen and audio activity on your computer and create industry-standard AVI video files and using its built-in SWF Producer can turn those AVIs into lean, mean, bandwidth-friendly Streaming Flash videos (SWFs).

Here are just a few ways you can use this software:

You can use it to create demonstration videos for any software programOr how about creating a set of videos answering your most frequently asked questions?You can create video tutorials for school or college classYou can use it to record a recurring problem with your computer so you can show technical support peopleYou can use it to create video-based information products you can sellYou can even use it to record new tricks and techniques you discover on your favourite software program, before you forget them.

Ditto is an extension to the standard windows clipboard. It saves each item placed on the clipboard allowing you access to any of those items at a later time.

Ditto allows you to save any type of information that can be put on the clipboard, text, images, html, custom formats.

Features

Easy to use interfaceSearch and paste previous copy entriesKeep multiple computer's clipboards in syncData is encrypted when sent over the networkAccessed from tray icon or global hot keySelect entry by double click, enter key or drag dropPaste into any window that excepts standard copy/paste entriesDisplay thumbnail of copied images in listFull Unicode support(display foreign characters)UTF-8 support for language files(create language files in any language)Uses sqlite database

Xion is a high fidelity, easily skinnable, out of this world audio player.

Xion features a new standard in skin support. Baffled by script syntax? Pulling your hair out over slicing up skin elements? Crying over spilt milk?

Xion's approach to skinning will remove all scripting and slicing requirements that other skin systems have placed on users. Xion will directly read a .PSD file and using layer names, instantly create your skin.

Xion also supports direct loading from Zip files which allow you to package several .PSD files in the one package. This has the added benefit of being compressed and therefore consumes less disk space.

Universal Extractor is a program do to exactly what it says: extract files from any type of archive, whether it's a simple zip file, an installation program, or even a Windows Installer (.msi) package.

InfraRecorder is a free CD/DVD burning solution for Microsoft Windows. It offers a wide range of powerful features; all through an easy to use application interface and Windows Explorer integration.

InfraRecorder is released under GPL version 3.

Features

Create custom data, audio and mixed-mode projects and record them to physical discs as well as disc images. Supports recording to dual-layer DVDs. Blank (erase) rewritable discs using four different methods. Record disc images (ISO and BIN/CUE). Fixate discs (write lead-out information to prevent further data from being added to the disc). Scan the SCSI/IDE bus for devices and collect information about their capabilities. Create disc copies, on the fly and using a temporary disc image. Import session data from multi-session discs and add more sessions to them. Display disc information. Save audio and data tracks to files (.wav, .wma, .ogg, .mp3 and .iso).

iDailyDiary provides a simple interface that immediately gets you started taking daily notes, creating a journal, putting your thoughts into writing and much more.

The iDailyDiary editor is "richtext" with the ability to insert graphics, URL's, Hypertext links and links to other diary pages. iDailyDiary is fully searchable so you can always track down those important dates and reminders.

The icloud service is all about giving you a greater computing experience and the comfort of always having your own desktop accessible wherever you go. All settings, icons and documents will stay exactly where you left them. You use icloud through your web browser or cell phone.

After you sign up on icloud you will receive your own highly customizable desktop, get access to plenty of useful online applications and a secure online file system. You can use icloud the same way you use your existing desktop.

With icloud you also get access to some truly unique features such as rich online collaboration, social networking and very easy publishing functionalities. These features and many more are built-in features in the icloud desktop.

icloud has the same ease of use and look and feel as any traditional popular desktop application but with the added benefit of running everything online in the cloud.

icloud consist of a desktop with applications and files that you run through your web browser. Because it's running in the cloud (the internet) it can offer you impressive features such as easy sharing, rich collaboration, built-in marketplace with free applications, seamless integration with your mobile device, and innovative drag-and-drop blog publishing. icloud is 100% committed to providing you with an exciting, reliable, and productive computing experience.

Writer makes it easy to share your photos and videos on almost any blog service—Windows Live, Wordpress, Blogger, Live Journal, TypePad, and many more.

Writer lets you publish to almost any blog service, including Windows Live, Wordpress, Blogger, Live Journal, TypePad, SharePoint, Community Server, and many more. Don’t have a blog yet? Writer can help you set one up.

SDelete is a command line utility that takes a number of options. In any given use, it allows you to delete one or more files and/or directories, or to cleanse the free space on a logical disk. SDelete accepts wild card characters as part of the directory or file specifier.

ITIL® is the only consistent and comprehensive documentation of best practice for IT Service Management. Used by many hundreds of organisations around the world, a whole ITIL philosophy has grown up around the guidance contained within the ITIL books and the supporting professional qualification scheme.

ITIL consists of a series of books giving guidance on the provision of quality IT services, and on the accommodation and environmental facilities needed to support IT. ITIL has been developed in recognition of organisations' growing dependency on IT and embodies best practices for IT Service Management.

The ethos behind the development of ITIL is the recognition that organisations are becoming increasingly dependent on IT in order to satisfy their corporate aims and meet their business needs. This leads to an increased requirement for high quality IT services.

A digital code that can be attached to an electronically transmitted message that uniquely identifies the sender. Like a written signature, the purpose of a digital signature is to guarantee that the individual sending the message really is who he or she claims to be. Digital signatures are especially important for electronic commerce and are a key component of most authentication schemes.

To be effective, digital signatures must be unforgeable. There are a number of different encryption techniques to guarantee this level of security.

How It Works

Assume you were going to send the draft of a contract to your lawyer in another town. You want to give your lawyer the assurance that it was unchanged from what you sent and that it is really from you.

1. You copy-and-paste the contract (it's a short one!) into an e-mail note.

2. Using special software, you obtain a message hash (mathematical summary) of the contract.

3. You then use a private key that you have previously obtained from a public-private key authority to encrypt the hash.

4. The encrypted hash becomes your digital signature of the message.

At the other end, your lawyer receives the message.

1. To make sure it's intact and from you, your lawyer makes a hash of the received message.

2. Your lawyer then uses your public key to decrypt the message hash or summary.

SET, short for Secure Electronic Transaction, is a standard that will enable secure credit card transactions on the Internet. SET has been endorsed by virtually all the major players in the electronic commerce arena, including Microsoft, Netscape, Visa, and Mastercard.

By employing digital signatures, SET will enable merchants to verify that buyers are who they claim to be. And it will protect buyers by providing a mechanism for their credit card number to be transferred directly to the credit card issuer for verification and billing without the merchant being able to see the number.

SET consists of three services:

Providing a secure communications channel among all parties involved in a transaction.

Providing trust by the use of X.509v3 digital certificates.

Ensuring privacy because the information is only available to parties in a transaction when and where necessary.

TLS (Transport Layer Security), defined in RFC 2246, is a protocol for establishing a secure connection between a client and a server. TLS (Transport Layer Security) is capable of authenticating both the client and the server and creating a encrypted connection between the two.

The TLS (Transport Layer Security) protocol is extensible, meaning that new algorithms can be added for any of these purposes, as long as both the server and the client are aware of the new algorithms.

TLS stands for Transport Layer Security and is the protocol which almost all security enabled browsers use. It was designed by Netscape and was formerly known SSL or Secure Sockets Layer.